Information Security booklet: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Security Controls Implementation==
==Security Controls Implementation==


[[Access Control]]<br>
[[Access Control:]]<br>
[[Physical and Environmental Protection]]<br>
[[Physical and Environmental Protection]]<br>
[[Encryption]]<br>
[[Encryption]]<br>
[[Malicious Code Prevention]]<br>
[[Malicious Code Prevention]]<br>
[[Systems Development, Acquisition, and Maintenance]]<br>
[[Systems Development, Acquisition, and Maintenance]]<br>
[[Personnel Security]]<br>
[[Personnel Security:]]<br>
[[Data Security]]<br>
[[Data Security]]<br>
[[Service Provider Oversight]]<br>
[[Service Provider Oversight]]<br>
[[Business Continuity Considerations]]<br>
[[Business_Continuity_Management: | Business Continuity Considerations]]<br>
[[Insurance]]<br>
[[Insurance: | Insurance Considerations]]<br>
<br>
<br>

Latest revision as of 13:31, 10 April 2007